
Целью работы ÑвлÑетÑÑ Ð¸Ð´ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸Ñ Ð¼Ð°Ð¹Ð½Ð¸Ð½Ð³-пула, оÑущеÑтвлÑющего атаку ÑгоиÑтичного майнинга. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ñовременные методы Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°ÐºÐ¸ ÑгоиÑтичного майнинга. Задачи, решаемые в ходе иÑÑледованиÑ: 1. Ðнализ механизма майнинга в ÑиÑтемах раÑпределенного рееÑтра Ñ Ð°Ð»Ð³Ð¾Ñ€Ð¸Ñ‚Ð¼Ð¾Ð¼ конÑенÑуÑа Proof-of-Work. 2. Ðнализ методов Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°Ðº ÑгоиÑтичного майнинга. 3. Разработка уÑовершенÑтвованного подхода к обнаружению атаки ÑгоиÑтичного майнинга. 4. Оценка подхода, теÑты и Ñравнение Ñ Ð´Ñ€ÑƒÐ³Ð¸Ð¼Ð¸ подходами. Ð’ ходе работы был иÑÑледован алгоритм майнинга в ÑиÑтемах раÑпределенного рееÑтра Ñ ÐºÐ¾Ð½ÑенÑуÑом Proof-of-Work. Были проанализированы Ñовременные иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² облаÑти Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°ÐºÐ¸ ÑгоиÑтичного майнинга. Ð’ результате работы было разработано ÑредÑтво Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°ÐºÐ¸ ÑгоиÑтичного майнинга в рамках майнинг-пула, была продемонÑтрирована ÑффективноÑть ÑредÑтва, произведено Ñравнение Ñ Ð´Ñ€ÑƒÐ³Ð¸Ð¼Ð¸ ÑредÑтвами. Был Ñделан вывод, что атака ÑгоиÑтичного майнинга актуальна на ÑегоднÑшний день, но мало изучена. Полученные результаты могут быть иÑпользованы в качеÑтве оÑновы разработки плагина Ð´Ð»Ñ Ð¿Ñ€Ð¾Ð³Ñ€Ð°Ð¼Ð¼Ð½Ð¾Ð³Ð¾ обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð¼Ð°Ð¹Ð½ÐµÑ€Ð¾Ð².
The purpose of the study is to identify a mining pool that is carrying out a selfish mining attack. The subject of the work is modern methods for detecting a selfish mining attack. The research set the following goals: 1. Analysis of the mining mechanism in distributed ledger systems with the Proof-of-Work consensus algorithm. 2. Analysis of methods for detecting selfish mining attack. 3. Development of an improved approach to detecting a selfish mining attack. 4. Assessment of the approach, tests and comparison with other approaches. During the work the mining algorithm was studied in distributed ledger systems with the Proof-of-Work consensus. Modern studies in the selfish mining attack detection area were analyzed. As a result of the work a tool for detecting a selfish mining attack within a mining pool was developed, the effectiveness of the tool was demonstrated, also a comparison with other tools is provided. It was concluded that the attack of selfish mining is relevant today, but poorly examined. The results obtained can be used as a base for a plugin for miner software.
аÑака ÑгоиÑÑиÑного майнинга, ÐÑкÑÑÑÑвеннÑй инÑеллекÑ, ÐнÑоÑмаÑиÑ, selfish mining attack, ÑиÑÑÐµÐ¼Ñ ÑаÑпÑеделенного ÑееÑÑÑа, distributed ledger technology
аÑака ÑгоиÑÑиÑного майнинга, ÐÑкÑÑÑÑвеннÑй инÑеллекÑ, ÐнÑоÑмаÑиÑ, selfish mining attack, ÑиÑÑÐµÐ¼Ñ ÑаÑпÑеделенного ÑееÑÑÑа, distributed ledger technology
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
